Home
Current Affairs January 2024

What is the correct answer?

4

What are the core components of the email system?
a) Email client
b) Email server
c) Internet service provider
d) All the above
Options:

A. A and B

B. B and D

C. A and C

D. D

Correct Answer :

D. D


Related Questions

What is the correct answer?

4

What the first inter-connected network is?

A. ARPANET

B. EXTRANET

C. INTRANET

D. None of the above

What is the correct answer?

4

Which version of TLS removed the support for MD5 and SHA-224?

A. TLS 1.0

B. TLS 1.1

C. TLS 1.2

D. TLS 1.3

What is the correct answer?

4

What is the full form of CSR related to the SSL Certificate?

A. Certificate Signing Request

B. Certificate Signal Response

C. Certificate Sample Resources

D. Certificate Sample Response

What is the correct answer?

4

Which layer of the OSI model is responsible for segmentation and reassembly?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following operating systems supports NFS?
a) Unix
b) Windows
c) Mac OS
d) Solaris
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

GSM stands for?

A. Global System for Mobile communication

B. Guest System for Mobile communication

C. Great System for Mobile communication

D. Global Server for Mobile communication

What is the correct answer?

4

URL stands for?

A. Universal Resource Locator

B. Universal Reserve Location

C. Ultimate Resource Locator

D. Uniform Resource Locator

What is the correct answer?

4

There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NVT?
a) The NVT is used for remote login; it defines how data and commands should be sent in the network.
b) It acts as an interface and used to resolve dependencies for remote login between client and server system.
c) The NVT stands for Network Viewer Terminal.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the OSI model?

A. The OSI model is a reference model that describes the network functionalities.

B. The OSI model is an implemented model that describes only network protocols.

C. The OSI model is an implemented model that describes only network topologies.

D. None of the above.

What is the correct answer?

4

Which default port is used for MySql Server?

A. 3506

B. 4406

C. 3306

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about OpenVPN protocol?
a) This protocol uses SSL/TLS based communication.
b) It is an open-source project, improved by hundreds of developers.
c) It is not an open-source protocol.
d) None of the above.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What an HTTP message contains?
a) Message Header
b) Message Type
c) Message Body
d) Message Length
Options:

A. A, C, and D

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which POP command is used to log off the session?

A. LOGOUT

B. LOGOFF

C. QUIT

D. EXIT

What is the correct answer?

4

Which of the following RFC number is related to URL?

A. RFC 1735

B. RFC 1738

C. RFC 2020

D. RFC 2021

What is the correct answer?

4

How many layers used in the OSI model?

A. 5

B. 6

C. 7

D. 8

What is the correct answer?

4

Which of the following default port is used for TFTP?

A. 69

B. 65

C. 70

D. 71

What is the correct answer?

4

Which of the following protocols are used for email?
a) SMTP
b) POP
c) ICMP
d) IMAP
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which of the following configuration file is used for SSH in the Linux operating system?

A. /etc/config/ssh.conf

B. /etc/ssh/sshd_config

C. /etc/ssh.config

D. /etc/sshfs.conf

What is the correct answer?

4

WiFi stands for?

A. Wireless Frequency

B. Wireless Fidelity

C. Wireless Fiber

D. Wireless Fricson

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about SSL handshake?
a) SSL handshake is a process between the web browser and web servers used for verification.
b) SSL handshake begins before transferring actual data.
c) SSL handshake is used to verify the SSL certificate.
d) SSL handshake is used for webserver authentication.
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

AM stands for?

A. Access Module

B. Abstract Module

C. Amplitude Modulation

D. Amplitude Module

What is the correct answer?

4

UHF stands for?

A. Ultimate High Frequency

B. Universal High Frequency

C. Union High Frequency

D. Ultra High Frequency

What is the correct answer?

4

Which of the following interface is used between the SGSN and GGSN?

A. Gn interface

B. Um interface

C. Gb interface

D. None of the above

What is the correct answer?

4

WBMP stands for?

A. Wireless Bitmap image

B. Wired Bitmap image

C. Worst Bitmap image

D. Worlds Bitmap image

What is the correct answer?

4

What is the full form of TFTP?

A. Transport File Transfer Protocol

B. Tree File Transfer Protocol

C. Trivial File Transfer Protocol

D. Trim File Transfer Protocol

What is the correct answer?

4

SNMP stands for?

A. Simple Network Message Protocol

B. Secure Network Message Protocol

C. Simple Network Management Protocol

D. Secure Network Management Protocol

What is the correct answer?

4

TFTP uses?

A. TCP

B. UDP

C. Both

D. None

What is the correct answer?

4

Which of the following are the processes of the GPRS network?
a) Attach Process
b) Detach Process
c) Authentication process
d) PDP activation process
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following are correct commands used in IMAP protocol?
a) CREATE
b) DELETE
c) RENAME
d) NOOP
Options:

A. A and B

B. A and C

C. B, C, and D

D. A, B, C, and D